Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2018-15473 PoC — OpenSSH 竞争条件问题漏洞

Source
Associated Vulnerability
Title:OpenSSH 竞争条件问题漏洞 (CVE-2018-15473)
Description:OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
Description
Checks a list of SSH servers for password-based auth availability and for the existence of SSH user enumeration vulnerability (CVE-2018-15473) in those identified.
Readme
# enumpossible
Checks a list of SSH servers for password-based auth availability and for the existence of SSH user enumeration  vulnerability (CVE-2018-15473) in those identified.

Uses a slightly modified version of [https://www.exploit-db.com/exploits/45939](https://www.exploit-db.com/exploits/45939) by [@LeapSecurity](https://www.twitter.com/@LeapSecurity) to check for CVE-2018-15473.

![screenshot](https://raw.githubusercontent.com/securemode/enumpossible/master/screenshot.png)

### Usage:
```
git clone https://github.com/securemode/enumpossible.git
```
Takes a list of servers in ip:port format:
```
# ./enumpossible.sh servers.txt
```
File Snapshot

[4.0K] /data/pocs/0b76e87317da16043d726ddcff1d6072cf6d72f4 ├── [4.6K] enumpossible.sh ├── [ 647] README.md ├── [ 34K] screenshot.png └── [2.5K] ssh_enum 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →